Last August, a well-prepared exhibition titled "Chinese Scripts: From Oracle Bones to Computer Bytes" opened in Beijing-based Chinese Modern Literature Museum. This exhibition toured Egypt last October as a ...Last August, a well-prepared exhibition titled "Chinese Scripts: From Oracle Bones to Computer Bytes" opened in Beijing-based Chinese Modern Literature Museum. This exhibition toured Egypt last October as a cultural event in celebration of the opening of China Cultural Center in Egypt. After that, it will be displayed in France, Malta and the Republic of Korea.展开更多
The 12 animal calendars of the Chinese zodiac are the essence and source of Chinese civilization,and have been deeply rooted in the production,life,and social activities of various ethnic groups in China since ancient...The 12 animal calendars of the Chinese zodiac are the essence and source of Chinese civilization,and have been deeply rooted in the production,life,and social activities of various ethnic groups in China since ancient times.The ancient Luo Yue stone inscription1 is a popular ancient script from four to six thousand years ago,and 17,496 characters have been found,which is the earliest script found on the Chinese land so far.A comparative study of Chinese zodiac characters2 between the ancient Luo Yue stone inscriptions and the oracle bone through paleographic conformation reveals that the two characters have the same and similar characteristics.Therefore,this paper intends to further investigate the kinship between the two,and to conduct a preliminary exploration of the origin,development,and evolution of the zodiac by combining recent human archaeological data,emerging molecular anthropological data,historical literature,and data from the Chinese Civilization Exploration Project,in an attempt to show the integration and dependence of Chinese civilization,the pluralistic pattern of Chinese culture,and the Chinese nation for thousands of years.展开更多
For the analysis of river evolution, the use of quantitative parameters can be quite useful in order to assess changes in the channel planform. Among the several parameters proposed by different authors in a number of...For the analysis of river evolution, the use of quantitative parameters can be quite useful in order to assess changes in the channel planform. Among the several parameters proposed by different authors in a number of papers, channel length and width, braiding and sinuosity indexes, and channel lateral shifting are proved to be the most effective ones for a quantitative analysis of river changes. However, the calculation of these parameters is time-consuming, tedious and error-prone, even where made in a GIS environment. This work describes four shell scripts that perform fast and automatic calculation of the morphometric parameters and draw curves showing the variation of the calculated parameters along the entire channel development. The scripts are based on commands of the GRASS GIS free and open source software and, as input, they require a simple vector map containing the essential features of a river channel, i.e. bankfull channel limits and longitudinal and lateral bars.展开更多
In a calligraphy class at Zhejiang University in Hangzhou,Zhejiang Province,Du Jianghan incorporates historical context into his teaching.Although still a student in the university,he teaches part time at the univers...In a calligraphy class at Zhejiang University in Hangzhou,Zhejiang Province,Du Jianghan incorporates historical context into his teaching.Although still a student in the university,he teaches part time at the university’s extracurricular calligraphy program,preserving and promoting calligraphy culture.展开更多
The inaugural"Belt and Road Nepal-China Buddhist Culture and Art Summit Forum"was held at the Lumbini Buddhist University in Nepal.The"Faxian-Xuanzang Scholarship Fund",jointly established by the C...The inaugural"Belt and Road Nepal-China Buddhist Culture and Art Summit Forum"was held at the Lumbini Buddhist University in Nepal.The"Faxian-Xuanzang Scholarship Fund",jointly established by the Chinese Culture Promotion Society and the Lumbini Buddhist University,was officially launched during the forum.The programme aims to support 100 Chinese and Nepali students in the next three years in conducting specialised research in such fields as Buddhist art and historical scripts.展开更多
Triaxial testing serves as a fundamental method for evaluating the elastic and strength properties of rocks,crucial for developing accurate 3D geomechanical models.This paper presents a novel method for determining st...Triaxial testing serves as a fundamental method for evaluating the elastic and strength properties of rocks,crucial for developing accurate 3D geomechanical models.This paper presents a novel method for determining strength parameters by incorporating the dependence of uniaxial compressive strength(UCS)on P-wave velocity into the Hoek-Brown criterion.Additionally,a new approach is introduced to process triaxial test data efficiently using Python libraries such as SciPy,NumPy,Matplotlib,and Pandas.Furthermore,the paper addresses challenges in determining elastic parameters through triaxial testing.A Python script is developed to automate the calculation of elastic modulus and Poisson's ratio,over-coming subjectivity in selecting the linear portion of stress-strain curves.The script optimally identifies the linear region by minimizing the fit error with appropriate constraints,ensuring a more objective and standardized approach.The proposed methodologies are demonstrated using limestone specimens from Central Asian gas fields.These innovations offer faster,more reliable results,reducing error and enhancing the comparability of analyses in geomechanics,with potential applications across various geological settings.展开更多
The phase field model can coherently address the relatively complex fracture phenomenon,such as crack nucleation,branching,deflection,etc.The model has been extensively implemented in the finite element package Abaqus...The phase field model can coherently address the relatively complex fracture phenomenon,such as crack nucleation,branching,deflection,etc.The model has been extensively implemented in the finite element package Abaqus to solve brittle fracture problems in recent studies.However,accurate numerical analysis typically requires fine meshes to model the evolving crack path effectively.A broad region must be discretized without prior knowledge of the crack path,further augmenting the computational expenses.In this proposed work,we present an automated framework utilizing a posteriori error-indicator(MISESERI)to demarcate and sufficiently refine the mesh along the anticipated crack path.This eliminates the need for manual mesh refinement based on previous experimental/computational results or heuristic judgment.The proposed Python-based framework integrates the preanalysis,sufficient mesh refinement,and subsequent phase-field model-based numerical analysis with user-defined subroutines in a single streamlined pass.The novelty of the proposed work lies in integrating Abaqus’s native error estimation and mesh refinement capability,tailored explicitly for phase-field simulations.The proposed methodology aims to reduce the computational resource requirement,thereby enhancing the efficiency of the phase-field simulations while preserving the solution accuracy,making the framework particularly advantageous for complex fracture problems where the computational/experimental results are limited or unavailable.Several benchmark numerical problems are solved to showcase the effectiveness and accuracy of the proposed approach.The numerical examples present the proposed approach’s efficacy in the case of a complex mixed-mode fracture problem.The results show significant reductions in computational resources compared to traditional phase-field methods,which is promising.展开更多
Todo Mongolian ancient books are widely scattered among people,and many scholars have made ef⁃forts to collect and organize Todo Mongolian ancient books.Mr.Batu is one of the outstanding representa⁃tives.The ancient b...Todo Mongolian ancient books are widely scattered among people,and many scholars have made ef⁃forts to collect and organize Todo Mongolian ancient books.Mr.Batu is one of the outstanding representa⁃tives.The ancient books and related materials,notes,and other materials Todo Mongolian script he col⁃lected in are rich in content and have extremely high research value.They can provide valuable firsthand information for the academic community and promote in-depth research on the Tote Mongolian lan⁃guage.It is necessary to photocopy and publish them.展开更多
Professor D.Taya’s research on“Buryat Geser in Traditional Mongolian Script”fills the information gap in the inheritance of Buryat Geser texts.It is the first specialized study to explore the inheritance rules of B...Professor D.Taya’s research on“Buryat Geser in Traditional Mongolian Script”fills the information gap in the inheritance of Buryat Geser texts.It is the first specialized study to explore the inheritance rules of Buryat Geser texts and conduct statistical research on their preservation,providing valuable aca⁃demic materials for future research on the inheritance of Geser texts and traditional Mongolian language.展开更多
In recent years,Power Shell has increasingly been reported as appearing in a variety of cyber attacks.However,because the PowerShell language is dynamic by design and can construct script fragments at different levels...In recent years,Power Shell has increasingly been reported as appearing in a variety of cyber attacks.However,because the PowerShell language is dynamic by design and can construct script fragments at different levels,state-of-the-art static analysis based Power Shell attack detection approaches are inherently vulnerable to obfuscations.In this paper,we design the first generic,effective,and lightweight deobfuscation approach for PowerShell scripts.To precisely identify the obfuscated script fragments,we define obfuscation based on the differences in the impacts on the abstract syntax trees of PowerShell scripts and propose a novel emulation-based recovery technology.Furthermore,we design the first semantic-aware PowerShell attack detection system that leverages the classic objective-oriented association mining algorithm and newly identifies 31 semantic signatures.The experimental results on 2342 benign samples and 4141 malicious samples show that our deobfuscation method takes less than 0.5 s on average and increases the similarity between the obfuscated and original scripts from 0.5%to 93.2%.By deploying our deobfuscation method,the attack detection rates for Windows Defender and VirusTotal increase substantially from 0.33%and 2.65%to 78.9%and 94.0%,respectively.Moreover,our detection system outperforms both existing tools with a 96.7%true positive rate and a 0%false positive rate on average.展开更多
This article explores the enduring effect of a narrative model known as suku ("speaking bitterness") in the post-Mao era, and in particular its gendered effect when women adopted it to represent their own lives. U...This article explores the enduring effect of a narrative model known as suku ("speaking bitterness") in the post-Mao era, and in particular its gendered effect when women adopted it to represent their own lives. Using the oral life-story of a woman who lived through the Mao era as an example, the article explores the ways suku operates as a master script in people's narratives about their lives. It argues that the adoption of the model in a certain sense resulted in the de-narration of gendered experience, as well as the de-narration of life in the post-Mao era, it further demonstrates that the suku narrative model limited not only the representation of certain experiences but also the construction of gender subjectivity. Furthermore, in the post-Mao era, instead of being the master script, the suku model often has to negotiate with other scripts, being revised, extended, redirected, and in some cases, replaced. One of these encounters, between the suku model and a feminist script, will be examined. The article argues that such encounter has the potential to challenge the master script and to create narrative space for women to narrate their gendered experience, and to construct a self-defined, more adequately articulated gender subjectivity.展开更多
Submission Manuscripts should be submitted by one of the authors of the manuscript through the online Manuscript Tracking System(MTS)(http://mc03.man uscriptcentral.com/epphy).Regardless of the source of the word-proc...Submission Manuscripts should be submitted by one of the authors of the manuscript through the online Manuscript Tracking System(MTS)(http://mc03.man uscriptcentral.com/epphy).Regardless of the source of the word-processing tool,only electronic PDF(.pdf) or Word(.doc,.docx,.rtf) files can be submitted through the MTS.There is no page limit.Only online submissions are accepted.Submissions by anyone other than one of the authors will not be accepted.The submitting author takes responsibility for the paper during submission and peer review.If for some technical reason,submission through the MTS is not possible,the author can contact epp@mail.iggcas.ac.cn for support.展开更多
Cross-Site Scripting(XSS)remains a significant threat to web application security,exploiting vulnerabilities to hijack user sessions and steal sensitive data.Traditional detection methods often fail to keep pace with ...Cross-Site Scripting(XSS)remains a significant threat to web application security,exploiting vulnerabilities to hijack user sessions and steal sensitive data.Traditional detection methods often fail to keep pace with the evolving sophistication of cyber threats.This paper introduces a novel hybrid ensemble learning framework that leverages a combination of advanced machine learning algorithms—Logistic Regression(LR),Support Vector Machines(SVM),eXtreme Gradient Boosting(XGBoost),Categorical Boosting(CatBoost),and Deep Neural Networks(DNN).Utilizing the XSS-Attacks-2021 dataset,which comprises 460 instances across various real-world trafficrelated scenarios,this framework significantly enhances XSS attack detection.Our approach,which includes rigorous feature engineering and model tuning,not only optimizes accuracy but also effectively minimizes false positives(FP)(0.13%)and false negatives(FN)(0.19%).This comprehensive methodology has been rigorously validated,achieving an unprecedented accuracy of 99.87%.The proposed system is scalable and efficient,capable of adapting to the increasing number of web applications and user demands without a decline in performance.It demonstrates exceptional real-time capabilities,with the ability to detect XSS attacks dynamically,maintaining high accuracy and low latency even under significant loads.Furthermore,despite the computational complexity introduced by the hybrid ensemble approach,strategic use of parallel processing and algorithm tuning ensures that the system remains scalable and performs robustly in real-time applications.Designed for easy integration with existing web security systems,our framework supports adaptable Application Programming Interfaces(APIs)and a modular design,facilitating seamless augmentation of current defenses.This innovation represents a significant advancement in cybersecurity,offering a scalable and effective solution for securing modern web applications against evolving threats.展开更多
Considering the escalating frequency and sophistication of cyber threats targeting web applications, this paper proposes the development of an automated web security analysis tool to address the accessibility gap for ...Considering the escalating frequency and sophistication of cyber threats targeting web applications, this paper proposes the development of an automated web security analysis tool to address the accessibility gap for non-security professionals. This paper presents the design and implementation of an automated web security analysis tool, AWSAT, aimed at enabling individuals with limited security expertise to effectively assess and mitigate vulnerabilities in web applications. Leveraging advanced scanning techniques, the tool identifies common threats such as Cross-Site Scripting (XSS), SQL Injection, and Cross-Site Request Forgery (CSRF), providing detailed reports with actionable insights. By integrating sample payloads and reference study links, the tool facilitates informed decision-making in enhancing the security posture of web applications. Through its user-friendly interface and robust functionality, the tool aims to democratize web security practices, empowering a wider audience to proactively safeguard against cyber threats.展开更多
文摘Last August, a well-prepared exhibition titled "Chinese Scripts: From Oracle Bones to Computer Bytes" opened in Beijing-based Chinese Modern Literature Museum. This exhibition toured Egypt last October as a cultural event in celebration of the opening of China Cultural Center in Egypt. After that, it will be displayed in France, Malta and the Republic of Korea.
文摘The 12 animal calendars of the Chinese zodiac are the essence and source of Chinese civilization,and have been deeply rooted in the production,life,and social activities of various ethnic groups in China since ancient times.The ancient Luo Yue stone inscription1 is a popular ancient script from four to six thousand years ago,and 17,496 characters have been found,which is the earliest script found on the Chinese land so far.A comparative study of Chinese zodiac characters2 between the ancient Luo Yue stone inscriptions and the oracle bone through paleographic conformation reveals that the two characters have the same and similar characteristics.Therefore,this paper intends to further investigate the kinship between the two,and to conduct a preliminary exploration of the origin,development,and evolution of the zodiac by combining recent human archaeological data,emerging molecular anthropological data,historical literature,and data from the Chinese Civilization Exploration Project,in an attempt to show the integration and dependence of Chinese civilization,the pluralistic pattern of Chinese culture,and the Chinese nation for thousands of years.
文摘For the analysis of river evolution, the use of quantitative parameters can be quite useful in order to assess changes in the channel planform. Among the several parameters proposed by different authors in a number of papers, channel length and width, braiding and sinuosity indexes, and channel lateral shifting are proved to be the most effective ones for a quantitative analysis of river changes. However, the calculation of these parameters is time-consuming, tedious and error-prone, even where made in a GIS environment. This work describes four shell scripts that perform fast and automatic calculation of the morphometric parameters and draw curves showing the variation of the calculated parameters along the entire channel development. The scripts are based on commands of the GRASS GIS free and open source software and, as input, they require a simple vector map containing the essential features of a river channel, i.e. bankfull channel limits and longitudinal and lateral bars.
文摘In a calligraphy class at Zhejiang University in Hangzhou,Zhejiang Province,Du Jianghan incorporates historical context into his teaching.Although still a student in the university,he teaches part time at the university’s extracurricular calligraphy program,preserving and promoting calligraphy culture.
文摘The inaugural"Belt and Road Nepal-China Buddhist Culture and Art Summit Forum"was held at the Lumbini Buddhist University in Nepal.The"Faxian-Xuanzang Scholarship Fund",jointly established by the Chinese Culture Promotion Society and the Lumbini Buddhist University,was officially launched during the forum.The programme aims to support 100 Chinese and Nepali students in the next three years in conducting specialised research in such fields as Buddhist art and historical scripts.
文摘Triaxial testing serves as a fundamental method for evaluating the elastic and strength properties of rocks,crucial for developing accurate 3D geomechanical models.This paper presents a novel method for determining strength parameters by incorporating the dependence of uniaxial compressive strength(UCS)on P-wave velocity into the Hoek-Brown criterion.Additionally,a new approach is introduced to process triaxial test data efficiently using Python libraries such as SciPy,NumPy,Matplotlib,and Pandas.Furthermore,the paper addresses challenges in determining elastic parameters through triaxial testing.A Python script is developed to automate the calculation of elastic modulus and Poisson's ratio,over-coming subjectivity in selecting the linear portion of stress-strain curves.The script optimally identifies the linear region by minimizing the fit error with appropriate constraints,ensuring a more objective and standardized approach.The proposed methodologies are demonstrated using limestone specimens from Central Asian gas fields.These innovations offer faster,more reliable results,reducing error and enhancing the comparability of analyses in geomechanics,with potential applications across various geological settings.
文摘The phase field model can coherently address the relatively complex fracture phenomenon,such as crack nucleation,branching,deflection,etc.The model has been extensively implemented in the finite element package Abaqus to solve brittle fracture problems in recent studies.However,accurate numerical analysis typically requires fine meshes to model the evolving crack path effectively.A broad region must be discretized without prior knowledge of the crack path,further augmenting the computational expenses.In this proposed work,we present an automated framework utilizing a posteriori error-indicator(MISESERI)to demarcate and sufficiently refine the mesh along the anticipated crack path.This eliminates the need for manual mesh refinement based on previous experimental/computational results or heuristic judgment.The proposed Python-based framework integrates the preanalysis,sufficient mesh refinement,and subsequent phase-field model-based numerical analysis with user-defined subroutines in a single streamlined pass.The novelty of the proposed work lies in integrating Abaqus’s native error estimation and mesh refinement capability,tailored explicitly for phase-field simulations.The proposed methodology aims to reduce the computational resource requirement,thereby enhancing the efficiency of the phase-field simulations while preserving the solution accuracy,making the framework particularly advantageous for complex fracture problems where the computational/experimental results are limited or unavailable.Several benchmark numerical problems are solved to showcase the effectiveness and accuracy of the proposed approach.The numerical examples present the proposed approach’s efficacy in the case of a complex mixed-mode fracture problem.The results show significant reductions in computational resources compared to traditional phase-field methods,which is promising.
文摘Todo Mongolian ancient books are widely scattered among people,and many scholars have made ef⁃forts to collect and organize Todo Mongolian ancient books.Mr.Batu is one of the outstanding representa⁃tives.The ancient books and related materials,notes,and other materials Todo Mongolian script he col⁃lected in are rich in content and have extremely high research value.They can provide valuable firsthand information for the academic community and promote in-depth research on the Tote Mongolian lan⁃guage.It is necessary to photocopy and publish them.
文摘Professor D.Taya’s research on“Buryat Geser in Traditional Mongolian Script”fills the information gap in the inheritance of Buryat Geser texts.It is the first specialized study to explore the inheritance rules of Buryat Geser texts and conduct statistical research on their preservation,providing valuable aca⁃demic materials for future research on the inheritance of Geser texts and traditional Mongolian language.
基金supported by the National Natural Science Foundation of China(No.U1936215)。
文摘In recent years,Power Shell has increasingly been reported as appearing in a variety of cyber attacks.However,because the PowerShell language is dynamic by design and can construct script fragments at different levels,state-of-the-art static analysis based Power Shell attack detection approaches are inherently vulnerable to obfuscations.In this paper,we design the first generic,effective,and lightweight deobfuscation approach for PowerShell scripts.To precisely identify the obfuscated script fragments,we define obfuscation based on the differences in the impacts on the abstract syntax trees of PowerShell scripts and propose a novel emulation-based recovery technology.Furthermore,we design the first semantic-aware PowerShell attack detection system that leverages the classic objective-oriented association mining algorithm and newly identifies 31 semantic signatures.The experimental results on 2342 benign samples and 4141 malicious samples show that our deobfuscation method takes less than 0.5 s on average and increases the similarity between the obfuscated and original scripts from 0.5%to 93.2%.By deploying our deobfuscation method,the attack detection rates for Windows Defender and VirusTotal increase substantially from 0.33%and 2.65%to 78.9%and 94.0%,respectively.Moreover,our detection system outperforms both existing tools with a 96.7%true positive rate and a 0%false positive rate on average.
文摘This article explores the enduring effect of a narrative model known as suku ("speaking bitterness") in the post-Mao era, and in particular its gendered effect when women adopted it to represent their own lives. Using the oral life-story of a woman who lived through the Mao era as an example, the article explores the ways suku operates as a master script in people's narratives about their lives. It argues that the adoption of the model in a certain sense resulted in the de-narration of gendered experience, as well as the de-narration of life in the post-Mao era, it further demonstrates that the suku narrative model limited not only the representation of certain experiences but also the construction of gender subjectivity. Furthermore, in the post-Mao era, instead of being the master script, the suku model often has to negotiate with other scripts, being revised, extended, redirected, and in some cases, replaced. One of these encounters, between the suku model and a feminist script, will be examined. The article argues that such encounter has the potential to challenge the master script and to create narrative space for women to narrate their gendered experience, and to construct a self-defined, more adequately articulated gender subjectivity.
文摘Submission Manuscripts should be submitted by one of the authors of the manuscript through the online Manuscript Tracking System(MTS)(http://mc03.man uscriptcentral.com/epphy).Regardless of the source of the word-processing tool,only electronic PDF(.pdf) or Word(.doc,.docx,.rtf) files can be submitted through the MTS.There is no page limit.Only online submissions are accepted.Submissions by anyone other than one of the authors will not be accepted.The submitting author takes responsibility for the paper during submission and peer review.If for some technical reason,submission through the MTS is not possible,the author can contact epp@mail.iggcas.ac.cn for support.
基金supported by Princess Nourah bint Abdulrahman University Researchers Supporting Project number(PNURSP2024R513),Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.
文摘Cross-Site Scripting(XSS)remains a significant threat to web application security,exploiting vulnerabilities to hijack user sessions and steal sensitive data.Traditional detection methods often fail to keep pace with the evolving sophistication of cyber threats.This paper introduces a novel hybrid ensemble learning framework that leverages a combination of advanced machine learning algorithms—Logistic Regression(LR),Support Vector Machines(SVM),eXtreme Gradient Boosting(XGBoost),Categorical Boosting(CatBoost),and Deep Neural Networks(DNN).Utilizing the XSS-Attacks-2021 dataset,which comprises 460 instances across various real-world trafficrelated scenarios,this framework significantly enhances XSS attack detection.Our approach,which includes rigorous feature engineering and model tuning,not only optimizes accuracy but also effectively minimizes false positives(FP)(0.13%)and false negatives(FN)(0.19%).This comprehensive methodology has been rigorously validated,achieving an unprecedented accuracy of 99.87%.The proposed system is scalable and efficient,capable of adapting to the increasing number of web applications and user demands without a decline in performance.It demonstrates exceptional real-time capabilities,with the ability to detect XSS attacks dynamically,maintaining high accuracy and low latency even under significant loads.Furthermore,despite the computational complexity introduced by the hybrid ensemble approach,strategic use of parallel processing and algorithm tuning ensures that the system remains scalable and performs robustly in real-time applications.Designed for easy integration with existing web security systems,our framework supports adaptable Application Programming Interfaces(APIs)and a modular design,facilitating seamless augmentation of current defenses.This innovation represents a significant advancement in cybersecurity,offering a scalable and effective solution for securing modern web applications against evolving threats.
文摘Considering the escalating frequency and sophistication of cyber threats targeting web applications, this paper proposes the development of an automated web security analysis tool to address the accessibility gap for non-security professionals. This paper presents the design and implementation of an automated web security analysis tool, AWSAT, aimed at enabling individuals with limited security expertise to effectively assess and mitigate vulnerabilities in web applications. Leveraging advanced scanning techniques, the tool identifies common threats such as Cross-Site Scripting (XSS), SQL Injection, and Cross-Site Request Forgery (CSRF), providing detailed reports with actionable insights. By integrating sample payloads and reference study links, the tool facilitates informed decision-making in enhancing the security posture of web applications. Through its user-friendly interface and robust functionality, the tool aims to democratize web security practices, empowering a wider audience to proactively safeguard against cyber threats.